2018
DOI: 10.1080/14702436.2018.1462661
|View full text |Cite
|
Sign up to set email alerts
|

Another manifestation of cyber conflict: attaining military objectives through cyber avenues of approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 23 publications
0
0
0
Order By: Relevance
“…In addition, the cyber conflict could be appeared with expanding its manifestation in cyberspace with the digital computers and its networks against its data emerged in perpetrating more for money and revenge than as an instrument of national and international conflict (Anggraeni et al, 2018;Fasana, 2018). The various extents clearly viewed into the typical crimes such as the embezzlement, bank fraud, unauthorized use, information theft and vandalism.…”
Section: Towards Cyber Conflictmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, the cyber conflict could be appeared with expanding its manifestation in cyberspace with the digital computers and its networks against its data emerged in perpetrating more for money and revenge than as an instrument of national and international conflict (Anggraeni et al, 2018;Fasana, 2018). The various extents clearly viewed into the typical crimes such as the embezzlement, bank fraud, unauthorized use, information theft and vandalism.…”
Section: Towards Cyber Conflictmentioning
confidence: 99%
“…Those are etiquette and netiquette (Kozík and Slivová, 2014) where both have been considered as behavioral guidelines for online networks. In particular, it covers both common behavior and proper manners for online users (Abadi et al, 2018d;Fasana, 2018). It also represents professional and social etiquette to be used for cyber conflict prevention, which requires Internet users to be courteous and precise in their social network interactions.…”
Section: Introductionmentioning
confidence: 99%